з¢Ã÷µÄ RustDoor ¶ñÒâÈí¼þð³ä Visual Studio ¸üÐÂ

Ðû²¼Ê±¼ä 2024-02-22
1. з¢Ã÷µÄ RustDoor ¶ñÒâÈí¼þð³ä Visual Studio ¸üÐÂ


2ÔÂ20ÈÕ £¬Ð·¢Ã÷µÄ Apple macOS ºóÃÅÃûΪ RustDoor £¬Ëüͨ¹ýÖØ´óµÄ¶ñÒâÈí¼þ»î¶¯Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓòµÄ¶à¼Ò¹«Ë¾¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ Rust ¿ª·¢ £¬¿ÉÔÚ»ùÓÚ Intel µÄ¼Ü¹¹ºÍ ARM ¼Ü¹¹ÉÏÔËÐС£Bitdefender µÄÑо¿Ö°Ô±ÖÁÉÙ´Ó 2023 Äê 11 ÔÂÆð¾ÍÒ»Ö±ÔÚ¸ú×ٸöñÒâÈí¼þ £¬·¢Ã÷ËüÓëÓëÎÛÃûÕÑÖøµÄALPHV/BlackCat ÀÕË÷Èí¼þÍÅ»ïÏà¹ØµÄ C2 ·þÎñÆ÷¾ÙÐÐͨѶ¡£RustDoor Ö÷Òª×÷Ϊ Visual Studio for Mac µÄ¸üгÌÐò¾ÙÐзַ¢ £¬¾ßÓвî±ðµÄÃû³Æ,Èç¡°zshrc2¡±¡¢¡°Previewers¡±¡¢¡°VisualStudioUpdater¡±¡¢¡°VisualStudioUpdater_Patch¡±¡¢¡°VisualStudioUpdating¡±¡¢¡°visualstudioupdate¡±ºÍ¡°DO_NOT_RUN_ChromeUpdates¡±¡£Ñ¬È¾ÏµÍ³ºó £¬¶ñÒâÈí¼þÓë C2 ·þÎñÆ÷ͨѶÒÔ¿ØÖÆÊÜѬȾµÄϵͳ¡¢Ö´ÐÐʹÃü²¢ÇÔÈ¡Êý¾Ý¡£


https://cyware.com/news/newly-discovered-rustdoor-malware-impersonates-visual-studio-update-148f6632/?web_view=true


2.Earth Preta Õë¶ÔÑÇÖ޵Ĺ¥»÷»î¶¯£ºDOPLUGS ¶ñÒâÈí¼þÍþв


2ÔÂ20ÈÕ £¬Check Point µÄÉîÈëÍþвÆÊÎöÆÊÎöÁ˸߼¶Ò»Á¬Íþв (APT) ×éÖ¯ Earth Preta µÄÒ»Á¬Ðж¯¡£Ö»¹ÜÆäÅ·Ö޻Êܵ½ÆÕ±é¼à¿Ø £¬µ«²»¿É·ñ¶¨µÄÊÇ £¬Æä¶ÔÑÇÖÞÄ¿µÄµÄ¸ß¶È¹Ø×¢¡£ÕâÒ»¶¨ÖÆÕ½ÂÔµÄÒªº¦ÊÇÒ»ÖÖÃûΪ DOPLUGS µÄ¶¨ÖƶñÒâÈí¼þ £¬ËüÊÇ×î½üһϵÁÐÈëÇÖÖÐʹÓõÄÒªº¦¹¤¾ß¡£ÆÊÎöÅú×¢ £¬ÕâÖÖ¶¨ÖÆµÄ PlugX ±äÌåÔ¶·Çµä·¶¡£Check Point µÄÑо¿Ö°Ô±ÊìϤµ½ÆäÆæÒìµÄÊôÐÔ £¬²¢½«ÆäÃüÃûΪ DOPLUGS¡£Óë¾ßÓÐÈ«Ì׺óÃÅÏÂÁîµÄ¹Å°å PlugX ¶ñÒâÈí¼þ²î±ð¡£ÓÐȤµÄÊÇ £¬Check Point ·¢Ã÷ÁËÄܹ»Ê¹Óá°KillSomeOne¡±USB È䳿²¡¶¾µÄ DOPLUGS ±äÌ壨×î³õÓÚ 2020 ÄêÆØ¹â£©¡£ÕâÒ»ÔöÌíµÄά¶ÈÓÐÖúÓÚÔÚÊÜѬȾµÄÍøÂçÖпìËÙÒÆ¶¯ £¬Í¹ÏÔÁËÍþв×é֯׷Çó¸üÆÕ±éµÄÉøÍ¸¡£


https://securityonline.info/earth-pretas-targeted-asian-campaigns-the-doplugs-malware-threat/


3.DNS Îó²î KeyTrap ¿Éµ¼Ö»¥ÁªÍø´ó¹æÄ£µÄÖÐÖ¹


2ÔÂ21ÈÕ £¬Ö»¹ÜËü×Ô 2000 ÄêÒÔÀ´¾ÍÒ»Ö±±£´æ £¬µ«Ñо¿Ö°Ô±×î½ü²Å·¢Ã÷ÓòÃûϵͳ (DNS) Çå¾²À©Õ¹ÖеÄÒ»¸ö»ù±¾Éè¼ÆÈ±ÏÝ £¬¸ÃȱÏÝÔÚijЩÇéÐÎÏ¿ÉÄܻᱻʹÓÃÀ´´Ý»Ù´ó¹æÄ£µÄ»¥ÁªÍø¡£DNS ·þÎñÆ÷½«ÍøÕ¾ URL ת»»Îª IP µØÖ· £¬²¢ÇÒÔÚ´ó´ó¶¼ÇéÐÎϲ»¿É¿´·¨³ÐÔØËùÓл¥ÁªÍøÁ÷Á¿¡£ÕâÒ»·¢Ã÷±³ºóµÄÍŶÓÀ´×Ե¹ú ATHENE ¹ú¼ÒÓ¦ÓÃÍøÂçÇå¾²Ñо¿ÖÐÐÄ¡£ËûÃǽ«¸ÃÇå¾²Îó²îÃüÃûΪ¡°KeyTrap¡± £¬±àºÅΪCVE-2023-50387¡£Æ¾Ö¤ËûÃǹØÓÚ KeyTrap DNS ¹ýʧµÄб¨¸æ £¬Ñо¿Ö°Ô±·¢Ã÷ £¬Ê¹Óà DNSSEC À©Õ¹·¢Ë͵½ DNS ·þÎñÆ÷ʵÏÖÀ´ÑéÖ¤Á÷Á¿µÄµ¥¸öÊý¾Ý°ü¿ÉÄÜ»áÆÈʹ·þÎñÆ÷½øÈëÆÊÎöÑ­»· £¬´Ó¶øµ¼ÖÂÆäÏûºÄËùÓÐ×Ô¼ºµÄÅÌËãÄÜÁ¦¡£Æ¾Ö¤¸Ã±¨¸æºÍ ISC µÄ˵·¨ £¬ºÃÐÂÎÅÊÇ £¬µ½ÏÖÔÚΪֹ £¬»¹Ã»ÓÐÈκÎ×Ô¶¯Ê¹ÓõÄÖ¤¾Ý¡£


https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-widespread-internet-outages


4. Joomla Ô¶³Ì´úÂëÖ´ÐÐÎó²î CVE-2024-21726


2ÔÂ20ÈÕ £¬Ñо¿ÍŶÓ×î½üµÄÒ»Ïî·¢Ã÷̻¶ÁËÊ¢ÐеÄJoomlaÄÚÈݹÜÀíϵͳ (CMS)ÖеÄÒ»¸öÖ÷ÒªµÄÇå¾²ÎÊÌâ¡£´ËÎó²îÖ¸¶¨ÎªCVE-2024-21726 £¬Îª¶àÖÖ¿çÕ¾¾ç±¾ (XSS) ¹¥»÷·­¿ªÁË´óÃÅ £¬¹¥»÷Õß¿ÉÒÔʹÓôËȨÏÞÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢Öض¨ÏòÍøÕ¾Á÷Á¿¡¢ÆÆËðÍøÕ¾»ò×°Öó¤ÆÚÐÔ¶ñÒâÈí¼þÒÔ½øÒ»²½Î£º¦¡£Joomla Ðж¯Ñ¸ËÙ £¬Ðû²¼Á˲¹¶¡°æ±¾£¨5.0.3¡¢4.4.3¡¢3.10.15-elts£©£©¡ £¿ÉÔöÌí Web Ó¦ÓóÌÐò·À»ðǽ (WAF) ºÍ°´ÆÚ¶ñÒâÈí¼þɨÃè £¬ÒÔÔöÌíÕë¶Ô¹¥»÷µÄÌØÊâÆÁÕÏ¡£Ç¿ÖÆÖ´ÐС°×îСȨÏÞ¡±Õ½ÂÔ £¬½öÏòÐèÒªÍêÈ«ÍøÕ¾¿ØÖƵÄÖ°Ô±ÊÚÓè¹ÜÆÊÎö¼ûȨÏÞ¡£


https://securityonline.info/cve-2024-21726-patch-now-to-stop-joomla-remote-code-execution/


5. VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ


2ÔÂ21ÈÕ £¬ÔÚ·¢Ã÷ÑÏÖØÇå¾²Îó²îºó £¬VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ (EAP)¡£¸ÃÎó²î±àºÅΪCVE-2024-22245£¨CVSS ÆÀ·Ö£º9.6£© £¬±»ÐÎòΪí§ÒâÉí·ÝÑéÖ¤Öм̹ýʧ¡£¶ñÒâÐÐΪÕß¿ÉÄÜ»áÓÕÆ­ÔÚÍøÂçä¯ÀÀÆ÷ÖÐ×°ÖÃÁË EAP µÄÄ¿µÄÓòÓû§ £¬ÇëÇó²¢×ª·¢í§Òâ Active Directory ·þÎñÖ÷ÌåÃû³Æ (SPN) µÄ·þÎñƱ֤¡£EAPÊÇÒ»¸öÈí¼þ°ü £¬Ö¼ÔÚÔÊÐíͨ¹ý Web ä¯ÀÀÆ÷Ö±½ÓµÇ¼ vSphere µÄ¹ÜÀí½çÃæºÍ¹¤¾ß £¬×Ô 2021 Äê 3 ÔÂÆðÒÑÆúÓá£Ä¬ÈÏÇéÐÎϲ»°üÀ¨Ëü £¬Ò²²»ÊôÓÚ vCenter Server¡¢ESXi »ò Cloud Foundation¡£ÖµµÃÖ¸³öµÄÊÇ £¬ÕâЩȱÏݽöÓ°ÏìÒѽ« EAP Ìí¼Óµ½ Microsoft Windows ϵͳÒÔͨ¹ý vSphere Client ÅþÁ¬µ½ VMware vSphere µÄÓû§¡£


https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html


6. Linux ¶ñÒâÈí¼þ»î¶¯ Migo Ãé×¼ Redis ¾ÙÐÐÍÚ¿ó


2ÔÂ20ÈÕ £¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔÊ¢ÐÐÊý¾Ý´æ´¢ÏµÍ³ Redis µÄÖØ´ó¶ñÒâÈí¼þ»î¶¯¡£¸Ã»î¶¯±»³ÆÎª¡°Migo¡± £¬½ÓÄÉÐÂÓ±µÄÕ½ÂÔÀ´ÆÆËð Redis ·þÎñÆ÷ £¬×îÖÕÄ¿µÄÊÇÔÚ Linux Ö÷»úÉÏÍÚ¾ò¼ÓÃÜÇ®±Ò¡£ÌØÊâÊÇ £¬Cado Ç徲ʵÑéÊÒÑо¿Ö°Ô±ÊӲ쵽 £¬Migo ʹÓÃÐ嵀 Redis ϵͳÈõ»¯ÏÂÁîÀ´Ê¹ÓÃÊý¾Ý´æ´¢¾ÙÐмÓÃÜÐ®ÖÆ¡£Óë֮ǰÕë¶Ô Redis µÄ¹¥»÷²î±ð £¬´Ë»î¶¯ÒýÈëÁËÆæÒìµÄÊÖÒÕÀ´Î£º¦ÏµÍ³µÄÇå¾²¡£¹¥»÷µÄ³õʼ»á¼û½×¶ÎÉæ¼°Ê¹ÓÃÌØ¶¨µÄ CLI ÏÂÁî½ûÓà Redis µÄÖÖÖÖÉèÖÃÑ¡Ïî¡£ÀýÈç £¬¹¥»÷Õ߹رձ£»¤Ä£Ê½ºÍ¸±±¾Ö»¶ÁµÈ¹¦Ð§ÒÔÔö½øÆä¶ñÒâ»î¶¯¡£»ñµÃ»á¼ûȨÏÞºó £¬¹¥»÷ÕßÉèÖÃÁËһϵÁÐÏÂÁîÀ´Ö´ÐÐ´Ó Transfer.sh ºÍ Pastebin µÈÍⲿȪԴ¼ìË÷µ½µÄ¶ñÒâ¸ºÔØ¡£ÕâЩÓÐÓøºÔØÖ¼ÔÚÔÚºǫ́ÍÚ¾ò¼ÓÃÜÇ®±Ò £¬Í¬Ê±¼á³Ö²»±»·¢Ã÷¡£


https://www.infosecurity-magazine.com/news/linux-malware-migo-targets-redis/